1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

How to protect yourself, your computer, and others on the internet
Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer May 2, 2008.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Share Your PC Get Started. Sharing a computer used to mean that others could see your private files, install software you didn't want, or change your.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Top 10 Checklist to Protect Your Personal Privacy Online Teens 1.
1 of 2 By observing the guidelines below and performing regular maintenance on your computer, you can help keep your computer safe and maintain optimum.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
1 of 2 Going on vacation requires careful preparation and there are a number of things you should do at the office before taking extended time off. This.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
10 Essential Security Measures PA Turnpike Commission.
Windows Tutorial 9 Maintaining Hardware and Software
New Data Regulation Law 201 CMR TJX Video.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Incident Security & Confidentiality Integrity Availability.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Society & Computers PowerPoint
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Security Keeping you and your computer safe in the digital world.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Top Tips for Online Safety Speaker Name Speaker Organization.
Protecting PHI & PII 12/30/2017 6:45 AM
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
Home Computer Security
Lesson 9 Windows Management
Part 3.
Windows Tutorial 9 Maintaining Hardware and Software
Implementing Client Security on Windows 2000 and Windows XP Level 150
Windows Operating System
Presentation transcript:

1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation. All rights reserved. The rapid growth in laptop computing has made portable systems targets of theft around the world. Follow these guidelines before and after removing laptops from corporate property to minimize the risk of loss. Secure Your Laptop Buy a cable lock that allows you to physically lock your laptop to a piece of heavy furniture. Place your laptop in a locked cabinet when leaving for an extended time. Avoid Using Obvious Computer Bags Carry your laptop more discreetly in something common such as a briefcase or suitcase. Never Write Down Passwords Never write down or leave access numbers or passwords in the carrying case. Keep Your Computer Close to Your Body Set down your laptop only if you can place it between your feet or against your leg (to help you monitor its location). Never Check Your Laptop as Luggage Carry your laptop with you onto an airplane instead of checking it with your luggage. Watch Your Laptop at Airport Security Keep an eye on your computer when going through airport security stations. Don't release your laptop until the person in front of you has gone through the metal detector, and retrieve it immediately after it has been screened. Use a Security Device Consider buying a security device that sounds an alarm when your laptop is improperly moved. Use a Laptop Privacy Screen Consider buying a privacy screen that prevents people from seeing your work over your shoulder. The privacy screen fits over your laptop screen and restricts the viewing angle. You will see the content only when you are directly in front of the screen, while others will see a blank or black screen from all other angles. Keep Your Laptop with You Keep your laptop with you as much as possible. If you can't keep it with you, keep it out of sight. For example, if you must leave your laptop in your vehicle, lock it in the trunk. Never Leave Your Laptop in Your Hotel Room If possible, do not leave your laptop in your hotel room or with the front desk. If you must leave it in your room, place it out of view and post the do not disturb sign on your door. Change the password associated with the corporate user ID. If you cant, contact your helpdesk for assistance. Report the theft to the local police and to Corporate Security. If customer data was on the laptop, contact your manager. If a Laptop Is Stolen, Immediately Do the Following:

2 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation. All rights reserved. Get the Latest Software Updates Keep your laptop up-to-date with the latest software updates. For Microsoft® Windows® XP, go to For other software, go to the manufacturers Web sites. Use Encryption Use the Encrypted File System (EFS) on all folders containing sensitive corporate or customer information. To use this, your computer must be using a NTFS file system. Back Up Your Data Back up all data that is sensitive or cannot be easily replaced. Back up data to a safe location on the corporate network. After confirming a successful backup, delete all databoth corporate and customer relatedthat is not essential for the job being performed. Be sure to empty the Recycle Bin as part of the process. Use Strong Passwords Use a strong password on all local accounts, especially the Administrator Password. Use a strong password on your Exchange personal folder (pst) file. Do not select the Save this password in your password list check box. Use a Password-Protected Screen Saver Use a password-protected screen saver set to activate after a maximum of 15 minutes of inactivity. Disable Dial-Up Networking Password Disable the Save password option in Dial-Up Networking. Store Removable Hard Drive If the laptop has a removable hard drive, disengage it from the rest of the device and store it in a separate, secure location. Write Down Asset Information Record in a safe place the laptop serial number, asset number, and model number. Download the Latest Antivirus, Antispyware, and Firewall Software Ensure that the latest antivirus software is loaded and running on your laptop. Also, you will want to make sure the firewall on your computer is turned on. You can visit for more information on spyware and links to some of the many spyware scanners that are available for download.